City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.42.145.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.42.145.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:32:30 CST 2025
;; MSG SIZE rcvd: 107
Host 150.145.42.169.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 150.145.42.169.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
195.24.198.17 | attackspam | Dec 8 03:40:15 php1 sshd\[18212\]: Invalid user password from 195.24.198.17 Dec 8 03:40:15 php1 sshd\[18212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.198.17 Dec 8 03:40:16 php1 sshd\[18212\]: Failed password for invalid user password from 195.24.198.17 port 37914 ssh2 Dec 8 03:47:37 php1 sshd\[18960\]: Invalid user daily from 195.24.198.17 Dec 8 03:47:37 php1 sshd\[18960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.198.17 |
2019-12-08 21:53:37 |
103.26.15.72 | attackspambots | Dec 8 07:12:52 roki sshd[22600]: Invalid user birkett from 103.26.15.72 Dec 8 07:12:52 roki sshd[22600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.15.72 Dec 8 07:12:54 roki sshd[22600]: Failed password for invalid user birkett from 103.26.15.72 port 34390 ssh2 Dec 8 07:25:07 roki sshd[23444]: Invalid user pi from 103.26.15.72 Dec 8 07:25:07 roki sshd[23444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.15.72 ... |
2019-12-08 21:50:09 |
94.224.84.48 | attackbotsspam | UTC: 2019-12-07 port: 554/tcp |
2019-12-08 22:15:13 |
39.68.215.130 | attack | UTC: 2019-12-07 port: 23/tcp |
2019-12-08 21:47:49 |
103.113.105.11 | attackspambots | Dec 8 15:23:25 itv-usvr-02 sshd[13476]: Invalid user admin from 103.113.105.11 port 46228 Dec 8 15:23:25 itv-usvr-02 sshd[13476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.113.105.11 Dec 8 15:23:25 itv-usvr-02 sshd[13476]: Invalid user admin from 103.113.105.11 port 46228 Dec 8 15:23:27 itv-usvr-02 sshd[13476]: Failed password for invalid user admin from 103.113.105.11 port 46228 ssh2 Dec 8 15:32:54 itv-usvr-02 sshd[13500]: Invalid user wyshogrod from 103.113.105.11 port 56516 |
2019-12-08 21:44:27 |
139.59.153.133 | attackspam | Automatic report - Banned IP Access |
2019-12-08 21:58:48 |
205.185.123.99 | attackbotsspam | firewall-block, port(s): 6970/tcp |
2019-12-08 22:05:21 |
111.231.202.159 | attack | SSH Brute Force, server-1 sshd[31598]: Failed password for invalid user password from 111.231.202.159 port 55662 ssh2 |
2019-12-08 22:12:51 |
94.191.77.31 | attackbotsspam | Dec 8 10:11:17 Ubuntu-1404-trusty-64-minimal sshd\[22838\]: Invalid user twyla from 94.191.77.31 Dec 8 10:11:17 Ubuntu-1404-trusty-64-minimal sshd\[22838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.77.31 Dec 8 10:11:19 Ubuntu-1404-trusty-64-minimal sshd\[22838\]: Failed password for invalid user twyla from 94.191.77.31 port 47724 ssh2 Dec 8 10:26:26 Ubuntu-1404-trusty-64-minimal sshd\[30851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.77.31 user=root Dec 8 10:26:27 Ubuntu-1404-trusty-64-minimal sshd\[30851\]: Failed password for root from 94.191.77.31 port 56628 ssh2 |
2019-12-08 22:10:54 |
76.165.144.16 | attackbots | Port 22 Scan, PTR: None |
2019-12-08 21:37:38 |
119.193.147.228 | attack | Dec 8 11:10:36 yesfletchmain sshd\[14356\]: Invalid user admin from 119.193.147.228 port 44098 Dec 8 11:10:36 yesfletchmain sshd\[14356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.147.228 Dec 8 11:10:39 yesfletchmain sshd\[14356\]: Failed password for invalid user admin from 119.193.147.228 port 44098 ssh2 Dec 8 11:17:07 yesfletchmain sshd\[14463\]: Invalid user dbus from 119.193.147.228 port 53976 Dec 8 11:17:07 yesfletchmain sshd\[14463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.147.228 ... |
2019-12-08 21:57:10 |
52.224.206.50 | attackspam | Fail2Ban Ban Triggered HTTP SQL Injection Attempt |
2019-12-08 21:45:03 |
159.203.201.139 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-08 21:58:30 |
66.70.189.236 | attackspambots | Dec 8 08:57:49 linuxvps sshd\[35391\]: Invalid user iannetta from 66.70.189.236 Dec 8 08:57:49 linuxvps sshd\[35391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.236 Dec 8 08:57:50 linuxvps sshd\[35391\]: Failed password for invalid user iannetta from 66.70.189.236 port 52520 ssh2 Dec 8 09:03:21 linuxvps sshd\[39215\]: Invalid user fader from 66.70.189.236 Dec 8 09:03:21 linuxvps sshd\[39215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.236 |
2019-12-08 22:11:13 |
45.55.67.128 | attack | Dec 8 14:14:54 localhost sshd[19555]: Failed password for invalid user ftpuser from 45.55.67.128 port 53214 ssh2 Dec 8 14:20:41 localhost sshd[20760]: Failed password for invalid user astatic from 45.55.67.128 port 33579 ssh2 Dec 8 14:25:33 localhost sshd[21779]: Failed password for invalid user oracle from 45.55.67.128 port 37932 ssh2 |
2019-12-08 21:34:25 |